Mohammed Shakeelmaster-webdevelopment.hashnode.dev·19 hours agoUser Authentication Level 5:In this guide, we'll explore Level 5 User Authentication, integrating local authentication (email and password) with Google OAuth. This implementation leverages industry standards to secure user data while offering seamless login options. Key Feature...OAuth2
Tomas Darquierblog.tomasdarquier.com·Nov 21, 2024Cómo Estructuré la Arquitectura de mi Plataforma Web de Generación de Código📌 Nota 1: Recomiendo leer el primer blog de la serie para comprender en que consta el sistema y el porque de ciertas tecnologías utilizadas. 📌 Nota 2: Actualmente, el sistema ya está funcional y desarrollado casi en su totalidad. El código y un vid...Diario del TFGSpring
Yug Jadvanitheyugjadvani.hashnode.dev·Nov 16, 2024Mastering Authentication in Next.js - A Step-by-Step Guide to GitHub Login with Auth.jsIntroduction Next.js has become a preferred framework for modern web applications due to its simplicity and flexibility. One key aspect of any application is user authentication, and integrating GitHub login into a Next.js project is a practical choi...Next.js
Shainil P Scodeshaine.hashnode.dev·Nov 4, 2024Carter: an typical e commerce projectI started this project september 2024.I don't remeber the exact date though . I made this project in order to put into my resume which I did. However, in order to stand out I needed to make this little unique . So I thought make this little complex b...e-commerce
Amey Poteameypote.hashnode.dev·Oct 31, 2024Guardians of the Gateway: JWT vs. OAuth2 for Spring Boot SecurityImagine you're hosting a party with exclusive invites and a strict guest list. Only invited guests can enter, and once they’re in, they’re free to roam. Sounds simple enough, right? But, what if you need different levels of access for different rooms...Springboot
Quang Phanquangphan.hashnode.dev·Oct 24, 2024Introduction to KeyCloak's OAuth 2.0 functionalities.In my previous article, we talked about how we can utilize KeyCloak as an IAM solution to protect our API endpoints. In this blog, we will explore some of the fundamental functionalities of KeyCloak such as: Client Credential Grant Password Grant ...40 readsOAuth2
Sachin Nandanwarwww.azureguru.net·Oct 8, 2024OAUTH2 In Microsoft FabricIn my previous article, I discussed how to leverage the newly introduced service principal support in Azure. In that article I used Azure SDK to create tokens to authenticate through service principal. This made me think if its possible to use custom...255 readsmicrosoftfabric
Kaiwalya KoparkarforElestioelestio.hashnode.dev·Oct 7, 2024How to Secure Apache Superset with OAuth2This guide will explain how to set up OAuth2 authentication in Apache Superset. OAuth2 is a popular open standard used for access delegation, allowing users to log in securely using third-party providers like Google or GitHub. By integrating OAuth2 i...Apache Superset
Evaldas Visockashashnode.programmersdiary.com·Sep 28, 2024Implementing social login on a website with Spring microservicesHi. This is the nineteenth part of the diary about developing the “Programmers’ diary” blog. Previous part: https://hashnode.programmersdiary.com/thoughts-on-implementing-local-and-social-logins-on-a-website. The open source code of this project is o...Springboot
Mainul Hasandev.webdevstory.com·Sep 23, 2024OneDrive Integration with React: Step-by-Step GuideIn this post, I’ll share how to integrate Microsoft OneDrive with your React application. We’ll explore the steps for OAuth 2.0 authentication, getting access and refresh tokens, managing file uploads, and addressing challenges like ETag conflicts an...OneDrive